Network-Wide Configuration Synthesis

نویسندگان

  • Ahmed El-Hassany
  • Petar Tsankov
  • Laurent Vanbever
  • Martin T. Vechev
چکیده

Computer networks are hard to manage. Given a set of highlevel requirements (e.g., reachability, security), operators have to manually figure out the individual configuration of potentially hundreds of devices running complex distributed protocols so that they, collectively, compute a compatible forwarding state. Not surprisingly, operators often make mistakes which lead to downtimes. To address this problem, we present a novel synthesis approach that automatically computes correct network configurations that comply with the operator’s requirements. We capture the behavior of existing routers along with the distributed protocols they run in stratified Datalog. Our key insight is to reduce the problem of finding correct input configurations to the task of synthesizing inputs for a stratified Datalog program. To solve this synthesis task, we introduce a new algorithm that synthesizes inputs for stratified Datalog programs. This algorithm is applicable beyond the domain of networks. We leverage our synthesis algorithm to construct the first network-wide configuration synthesis system, called SyNET, that support multiple interacting routing protocols (OSPF and BGP) and static routes. We show that our system is practical and can infer correct input configurations, in a reasonable amount time, for networks of realistic size (> 50 routers) that forward packets for multiple traffic classes.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Policy Model for Sharing Network Slices in 5G Core Network

As mobile data traffic increases, and the number of services provided by the mobile network increases, service load flows as well, which requires changing in the principles, models, and strategies for media transmission streams serving to guarantee the given nature of giving a wide scope of services in Flexible and cost-effective. Right now, the fundamental question remains what number of netwo...

متن کامل

NetComplete: Practical Network-Wide Configuration Synthesis with Autocompletion

Network operators often need to adapt the configuration of a network in order to comply with changing routing policies. Evolving existing configurations, however, is a complex task as local changes can have unforeseen global effects. Not surprisingly, this often leads to mistakes that result in network downtimes. We present NetComplete, a system that assists operators in modifying existing netw...

متن کامل

Asymmetric Synthesis of New Diastereomerically Pure Spiro Oxindolopyrrolizidines and Oxindolopyrrolidines via Cycloaddition Reactions of Azomethine Ylides and Menthol-Drived Trans-Cinnamic

Chiral pyrrolidines and pyrrolizidines with spirooxindole ring systems are the central skeletons for numerous alkaloids and pharmacologically important compounds. Gelesmine, pseudotabersonine, formosanine, isoformosanine, morroniside and mitraphylline are some of the alkaloids containing spirooxindole ring systems. Derivatives of spirooxindole find very wide biological applications as anti micr...

متن کامل

Asymmetric Synthesis of New Diastereomerically Pure Spiro Oxindolopyrrolizidines and Oxindolopyrrolidines via Cycloaddition Reactions of Azomethine Ylides and Menthol-Drived Trans-Cinnamic

Chiral pyrrolidines and pyrrolizidines with spirooxindole ring systems are the central skeletons for numerous alkaloids and pharmacologically important compounds. Gelesmine, pseudotabersonine, formosanine, isoformosanine, morroniside and mitraphylline are some of the alkaloids containing spirooxindole ring systems. Derivatives of spirooxindole find very wide biological applications as anti micr...

متن کامل

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation

Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of threats to networks. A honeypot is one of the basic techniques employed for network security improvement. It is basically designed to be attacked so as to get the attackers’...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017